AS ICT Notes Ch. 7 - G061

HideShow resource information
Preview of AS ICT Notes Ch. 7 - G061

First 188 words of the document:

Varun Pratap
CHAPTER 7 NOTES
Data Protection Act 1998
The purpose of the DPA is to protect individual from organisations
Main aspects of the Data Protection Act (1998)
-Accurate
-Secure
-Used for specified purposes
-Not kept for longer than necessary
-Fairly and lawfully processed
DPA Terminology
Personal Data ­ Covers both facts and opinions about a living individual
Data ­ Anything which is part of a record about an individual e.g DOB, Name
Processing ­ Collection and storage of data which includes sorting the data into order
Data Subject ­ The person that the data is being collected from or stored about
Data Controller ­ Is responsible for ensuring the data meets the rights of the DPA
Data Processor ­ Third parties who process the data who are not necessarily part of the Data
controller's organisation
Recipient - This is any person who is employed to access, use or process personal data as part of
their job
(Information) Commissioner ­ The person who has overall responsibility for enforcing the DPA across
the UK

Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Varun Pratap
The Eight Principles
Personal data should be obtained and processed fairly and lawfully
Personal data can be held only for specified and lawful purposes
Personal data should be adequate, relevant and not excessive for the required purpose
Personal data should be accurate and kept up-to-date
Personal data should not be kept for longer than is necessary
Data must be processed in accordance with the rights of the data subject
Appropriate security measures must be taken against unauthorised access
Personal data cannot be transferred…read more

Page 3

Preview of page 3

Here's a taster:

Varun Pratap
Computer Misuse Act 1990
The purpose of the Act is to prevent the unauthorised use of computer systems and relates to both
hardware and software
Computer Misuse Act Offences
· Unauthorised access to computer material
· Unauthorised access with intent to commit further crimes
· Unauthorised modification of computer material
· Making, supplying or obtaining material that could be used in computer misuse offences e.…read more

Page 4

Preview of page 4

Here's a taster:

Varun Pratap
Regulation of Investigatory Powers Act 2000
The purpose of the Act is for the organisation to lawfully intercept any misuse of communications
device
Organisations may monitor and record communications
Prevent or detect crimes
Prevent public disorder from occurring
To ensure national security and the safety of the general public
To investigate or detect any abnormal or illegal use of telecommunication systems
Advantages
· The company can monitor what its employees are doing
· Make sure that the facilities are only being used for…read more

Page 5

Preview of page 5

Here's a taster:

Varun Pratap
Electronic Communications Act (2000)
The purpose of the ECA was to make the UK the best place in the world for e-commerce
Advantages
Contracts that are signed over the Internet have the same legality as those signed by hand
Increases the security with which individuals can engage in e-commerce
Contracts entered into have legal backing
Disadvantages
Many people aren't aware of digital signatures therefore it will take time for it to be accepted
Since transactions are important to people it will take a…read more

Page 6

Preview of page 6

Here's a taster:

Varun Pratap
Methods for combating ICT crime and protecting ICT systems
· Physical Security (Security guards)
· Biometric Security (Fingerprints)
· Location of Equipment
· Firewalls (Prevents unauthorised computers connecting to your network)
· Backup (Making a copy of the data)
· Encryption (Coding the data)
· Software Patches / Updates (Removes any flaws in the software)
· Anti-virus / anti-spyware (Prevents viruses and spyware infecting machine)
· Access rights (Access is only granted to certain users)
· Auditing (Running programs to look at what…read more

Page 7

Preview of page 7

Here's a taster:

Varun Pratap
Heath Risk Cause Prevention
Deep Vein Sitting in a chair that Stand up and move around
Thrombosis puts pressure on the Ensure that the posture when sitting in a chair is correct
(DVT) back of the knees
Repetitive Repetitive actions, Correct workstation, keyboard rests, foot stools,
Strain Injury poor posture whilst adjustable chairs and frequent breaks from continuous
(RSI) working, maintaining a activity.…read more

Page 8

Preview of page 8

Here's a taster:

Varun Pratap
Fire Overheating of computers can cause Ventilation of computers ­ space on
them to catch fire. all sides.
Overloading of plug sockets can cause Do not overload plug sockets.
fire Correct number of sockets on a
breaker.
Correct (CO2) fire extinguisher
Electrocution Water and electricity can cause No drinking near computers.
electrocution No water nearby.
Bare wires, when touched, can cause All wires to be frequently checked
electrocution.…read more

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all resources »